Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 3 December 2010

460 Chinese Hackers show why IT security is so critical

Posted on 09:44 by Unknown

London, UK 3rd December 2010 - Reports are coming out of China that the government has made a total of 460 arrests of computer hackers so far this year. This figure is an effective admission by Chinese officials that the country has the same problem as here in the West – namely, large numbers of IT-literate people who are crossing over into dark hat hacker territory.

According to Claire Sellick, Event Director for Infosecurity Europe, as if this number was not an eye opener in itself, the Chinese government has revealed that arrests of hackers have soared by an amazing 80 per cent compared to last year.  Infosecurity Europe will be held at Earls Court, London 19-21 April 2011 www.infosec.co.uk

"China's Ministry of Public Security has described the hacker situation in the country as very grim and, whilst it observes that a number of computers in companies have little or no effective security measures, it really does illustrate the scale of the problem," she said.

"China is rapidly entering the ascendant in the IT stakes, with the country now boasting the largest number of mobile phones of any country in the world. It’s also clear that the country's Internet infrastructure is also growing rapidly, along with the number of Internet users," she added.

The Infosecurity Europe Event Director went on to say that the media has been full of oblique references to Western computer systems being attacked by hacktivists who are sympathetic to the Chinese cause.

Some outlets have even reported that the government was behind the attacks on Google late last year, a topic that cropped up in the current raft of documents being released in the Wikileaks saga (http://bit.ly/hjoFu0), she noted.

The crucial thing to remember, says Sellick, is that the rise of the Internet means that the world has become a global village, meaning that it just as easy for hackers in a Chinese city to attack a company IT resource in the UK, as it is for a hacker elsewhere in the UK.

The Internet, she explained, has changed many aspects of the IT and business world, and whilst most of those changes have been for the better, some are not.

It's against this backdrop that the Infosecurity Europe show Event Director says that it has become imperative for organisations to deploy the very best security technology to defend their digital data assets.

"But keeping up to speed with these trends, as well as abreast of the latest security defence technologies and strategies, has almost become a full-time job," she said.

"This is why we're encouraging IT and business professionals to make space in their diaries for the next Infosecurity Europe event, which takes place at Earls Court 1, London, between the 19th and the 21st of April, 2011," she added.

For more on the Chinese hacker arrests and ministry comments: http://bit.ly/f3xyOP

Infosecurity Europe, celebrating 16 years at the heart of the industry in 2011, is Europe’s number one Information Security event. Featuring over 300 exhibitors, the most diverse range of new products and services, an unrivalled education programme and visitors from every segment of the industry, it is the most important date in the calendar for Information Security professionals across Europe. Organised by Reed Exhibitions, the world’s largest tradeshow organiser, Infosecurity Europe is one of four Infosecurity events around the world with events also running in Belgium, Netherlands and Russia. Infosecurity Europe runs from the 19th – 21st April 2011, in Earls Court, London. For further information please visit www.infosec.co.uk

Source: Eskenzi PR

This press release is presented without editing for your information only.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ▼  2010 (192)
    • ▼  December (20)
      • Beware of Malicious Twitter trends
      • PRIVILEGE GUARD NAMED "BEST SECURITY PRODUCT 2010"
      • Infosecurity Europe organisers say lack of awarene...
      • CitySights card hack could generate PCI DSS fallout
      • Working to Prevent Being the Next WikiLeak? Don’t ...
      • As 4m Brits travel this Christmas, thousands of Mo...
      • Imperva research: Insiders are most often responsi...
      • Report shows UK Government and IT security experts...
      • After this years’ security Tsunami – tips on how t...
      • ISACA leader warns companies to prepare for a Fran...
      • Organisations warned to review security as WikiLea...
      • Just in Time for the Holidays – Zeus Targets Major...
      • Bank of Cyprus UK secures its customers with Trust...
      • Imperva Unveils Comprehensive Strategy to Enhance ...
      • New ISACA Guide Shares Strategies for Minimizing V...
      • 460 Chinese Hackers show why IT security is so cri...
      • Seeweb selects Scality to provide faster public cl...
      • The Golden Hour of Phishing Attacks
      • NHS Choices response to Facebook security issue is...
      • USB Consumerism Out Of Control as 21% use 10 or more
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile